Cybersecurity
Authors
News Type
Blogs
Date
Paragraphs

Can Bitcoin thrive without China? 

Bitcoin started the month of September trading at an all-time high of $4,950. By implementing Segregated Witness, or SegWit, Bitcoin allowed more transactions to take place and signaled confidence that Bitcoin would scale. On September 4, the Chinese central bank banned trading in initial coin offerings (ICOs), leading to rumors that China was considering banning Bitcoin trading altogether. Those rumors were confirmed on September 14, and Bitcoin exchanges operating in China were told to cease trading for now. This article explores what happened next, and what the future of Bitcoin is without its largest mining pools...

 

Hero Image
Bitcoin accepted here Getty Images
All News button
1

Are you interested in cybersecurity? Have you wanted to learn offensive cyber techniques  but don't know where to get started? The Applied Cybersecurity team is hosting an introductory workshop to get people going with practicing exploitation and offensive cyber techniques in an ethical setting. In particular, we will focus on gaining familiarity with techniques used for competing in Capture the Flag (CTF)* competitions. We'll be hosting the first workshop this Friday, in preparation for the Hitcon CTF next week. Bring a laptop! This workshop will assume no prerequisite experience with hacking or cybersecurity so please attend regardless of how unfamiliar you are with the topic. For this workshop, we will focus on web vulnerabilities, binary reversing, and some basic cryptography challenges. Note that experience equivalent to CS107 will be useful. Food will be provided! RSVP here: https://goo.gl/forms/M5yzuQasIZpL4Ovy1

Shriram 366

News Type
News
Date
Paragraphs

The Stanford Applied Cyber Team took 1st place in the Collegiate Penetration Testing Competition (CPTC) Western Regionals.

After 8 hours of intense penetration testing on Saturday, October 7th, at Uber HQ in San Francisco, the Stanford team returned to campus and authored a 52 page findings and remediation report, finishing up at 3AM and then returning to the CPTC competition venue to deliver their recommendations by 8AM Sunday.

Demonstrating moxie and professionalism under fire, the team consisting of Paul Crews, Albert Liang, Kate Stowell, Travis Lanham, Wilson Nguyen, Colleen Dai, and coach Alex Keller have qualified for the CPTC Nationals November 3-5 in Rochester, NY.

 

Hero Image
cptc applied cybersecurity team
All News button
1
(650) 724-6814
0
rsd25_070_0089a.jpg

Michelle joined Stanford in the Summer of 2004 in the Psychology Department. She has worked in in the School of Medicine, the School of Engineering, and the Law School. She currently works in the Freeman Spogli Institute for International Studies in the Tech Impact and Policy Center. Her skills include calendar management, finances, and event planning. She is a sustaining member of the Junior League of San Jose and recruits/manages volunteers for a local festival in Santa Cruz. In her free time Michelle likes to go camping, attend concerts, and volunteer for several local non-profit organizations.

Program Administrator
Date Label
-
Stanford Cyber Initiative Seminar: Securing California - Peter Liebert, Chief Information Security Officer for the State of California. 
October 19th, 5pm, 380-380Y

What cybersecurity challenges does California face, as the 6th largest economy in the world? How is cybersecurity scalable from a university, local, state, and federal level? Do state CISOs work together, and how does information sharing between states affect cybersecurity? Learn more about setting security policy and security practice in our state. 
 
Peter Liebert serves as chief information security officer and director of the Office of Information Security at the California Department of Technology. Liebert has been senior product manager at FireEye Inc. since 2016, where he was threat assessment manager from 2015 to 2016. He served in several positions at the United States Cyber Command, where he was special assistant in the Office of the Secretary of Defense for cyber policy from 2014 to 2015 and senior cyber policy analyst from 2013 to 2014. Liebert served as cybersecurity and logistics analyst in the Office of the Chief of Naval Operations from 2011 to 2013 and was lead for the Palestinian Logistics Mentoring and Warehouse Information Technology Program at DynCorp International from 2008 to 2010. He served as an officer in the U.S. Navy from 2000 to 2008. He earned a Master of Public Administration degree from the Harvard University, Kennedy School of Government and a Master of Science degree in international security from Cranfield University.

Building 380, Room 380Y, Main Quad, Stanford campus

Peter Liebert CISO California Department of Technology
Seminars

CISAC
Stanford University
Encina Hall, C428

Stanford, CA 94305-6165

(650) 723-9866
0
Andrew Grotto

Andrew J. Grotto is a research scholar at the Center for International Security and Cooperation at Stanford University.

Grotto’s research interests center on the national security and international economic dimensions of America’s global leadership in information technology innovation, and its growing reliance on this innovation for its economic and social life. He is particularly interested in the allocation of responsibility between the government and the private sector for defending against cyber threats, especially as it pertains to critical infrastructure; cyber-enabled information operations as both a threat to, and a tool of statecraft for, liberal democracies; opportunities and constraints facing offensive cyber operations as a tool of statecraft, especially those relating to norms of sovereignty in a digitally connected world; and governance of global trade in information technologies.

Before coming to Stanford, Grotto was the Senior Director for Cybersecurity Policy at the White House in both the Obama and Trump Administrations. His portfolio spanned a range of cyber policy issues, including defense of the financial services, energy, communications, transportation, health care, electoral infrastructure, and other vital critical infrastructure sectors; cybersecurity risk management policies for federal networks; consumer cybersecurity; and cyber incident response policy and incident management. He also coordinated development and execution of technology policy topics with a nexus to cyber policy, such as encryption, surveillance, privacy, and the national security dimensions of artificial intelligence and machine learning. 

At the White House, he played a key role in shaping President Obama’s Cybersecurity National Action Plan and driving its implementation. He was also the principal architect of President Trump’s cybersecurity executive order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”

Grotto joined the White House after serving as Senior Advisor for Technology Policy to Commerce Secretary Penny Pritzker, advising Pritzker on all aspects of technology policy, including Internet of Things, net neutrality, privacy, national security reviews of foreign investment in the U.S. technology sector, and international developments affecting the competitiveness of the U.S. technology sector.

Grotto worked on Capitol Hill prior to the Executive Branch, as a member of the professional staff of the Senate Select Committee on Intelligence. He served as then-Chairman Dianne Feinstein’s lead staff overseeing cyber-related activities of the intelligence community and all aspects of NSA’s mission. He led the negotiation and drafting of the information sharing title of the Cybersecurity Act of 2012, which later served as the foundation for the Cybersecurity Information Sharing Act that President Obama signed in 2015. He also served as committee designee first for Senator Sheldon Whitehouse and later for Senator Kent Conrad, advising the senators on oversight of the intelligence community, including of covert action programs, and was a contributing author of the “Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program.”

Before his time on Capitol Hill, Grotto was a Senior National Security Analyst at the Center for American Progress, where his research and writing focused on U.S. policy towards nuclear weapons - how to prevent their spread, and their role in U.S. national security strategy.

Grotto received his JD from the University of California at Berkeley, his MPA from Harvard University, and his BA from the University of Kentucky.

Research Scholar, Center for International Security and Cooperation
Director, Program on Geopolitics, Technology, and Governance
Date Label
0
Visiting Scholar, Ukrainian Emerging Leaders Program 2017-18
oleksandars_copy.jpg

Olexandr Starodubtsev is a Ukrainian reformer who is deeply involved in the creation of a new electronic public procurement system Prozorro, which is one of the most famous reforms in the country. Currently Starodubtsev is the Head of the Public Procurement Regulation Department in The Ministry of Economic Development and Trade of Ukraine, and is an official policy maker in the spheres of public procurement and economic development in Ukraine.

The Prozorro system is famous for its different approaches to bottom-up reform based on the close collaboration between government, business and civil society. In 2016, the Prozorro system won several distinguished international awards, such as the Open Government Partnership Award, the Public Procurement Award, and was also recognized by the European Bank of Reconstruction and Development and Open Contracting Partnership. Moreover, Prozorro and its principles became an inspirational example for other Ukrainian reforms.

Starodubtsev was born in Kharkiv, Ukraine in 1979. He graduated from Kharkiv National University in 2002. Previously he worked on the stock market where he made his career as a back-office specialist up to a managing partner of a Ukrainian branch of a multinational financial institution. He received an MBA degree from the Kyiv-Mohyla Business School and became Alumnus of the Year in its first competition in 2015. He is married and has a son and a daughter.

 

-

Abstract: The U.S. government continues to struggle with how best to defend the country from cyber attacks. Reacting out in frustration, Senator John McCain wondered aloud if the United States should consider what lessons can be learned from a new cyber defense organization in the United Kingdom called the National Cyber Security Center (NCSC). In this paper, Stuart Russell and Michael Sulmeyer examine the NCSC, its origins, its missions, and its effectiveness. They then consider how certain aspects of the NCSC might map onto the more complicated governance structure around cyber defense in the United States. Despite important differences between the United Kingdom and the United States, they conclude that there is a great deal the United States can adapt from the United Kingdom’s efforts, particularly the NCSC’s ambitious Active Defense agenda. 

Speaker Bio: Dr. Michael Sulmeyer is the Belfer Center's Cyber Security Project Director at the Harvard Kennedy School. He is also a Contributing Editor for the national security blog Lawfare. Before Harvard, he served as the Director for Plans and Operations for Cyber Policy in the Office of the Secretary of Defense. There, he worked closely with the Joint Staff and Cyber Command on a variety of efforts to counter malicious cyber activity against U.S. and DoD interests. For this work, he received the Secretary Medal for Exceptional Public Service.

Previously, he worked on arms control and the maintenance of strategic stability between the United States, Russia, and China. As a Marshall Scholar, Sulmeyer received his PhD (DPhil) in Politics from Oxford University, and his dissertation, "Money for Nothing: Understanding the Termination of U.S. Major Defense Acquisition Programs," won the Sir Walter Bagehot Prize for best dissertation in government and public administration. He received his B.A. and J.D. from Stanford University and his M.A. in War Studies from King's College London. In the mid-1990s, he was the System Operator (SysOp) of The Summit BBS in Santa Barbara, California.

William J. Perry Conference Room

Encina Hall, 2nd floor

616 Serra Street

Stanford, CA 94305

Director, Cyber Security Project Belfer Center for Science and International Affairs
Seminars
-

Abstract: What is the strategic value of cyber weapons? Even though a growing body of research has addressed the destructive potential of cyber weapons, there remains a large gap in thinking about the strategic utility of these capabilities. The purpose of this paper is to partially fill this gap, by means of assessing under what conditions 'counterforce’ and ‘countervalue’ cyber weapons can be effective. I argue that cyber weapons can provide an ‘extra option’ to leaders. The discussed cases suggest that they can be used both as an important force-multiplier enabler for conventional military assets or as independent capability. Cyber weapons can also be used to achieve a form of psychological ascendancy and can be used effectively with few casualties.

Speaker Bio: Max Smeets is a cybersecurity fellow at the Center for International Security and Cooperation and holds a DPhil in International Relations from the University of Oxford, St. John’s College. Max current book project focuses on the causes underlying cyber proliferation and restraint. The results of this research are valuable for understanding the likely changes in the future prevalence of cyber weapons. It clarifies to what degree this is an ‘inevitable’ development – and if/how it can be stopped.

Max was a College Lecturer in Politics at Keble College, University of Oxford, and Research Affiliate of the Oxford Cyber Studies Programme. He was also a Carnegie Visiting Scholar at Columbia University SIPA and a Doctoral Visiting Scholar at Sciences Po CERI. He holds an undergraduate degree from University College Roosevelt, Utrecht University, and an M.Phil in International Relations from the University of Oxford, Brasenose College.  Max has a diverse professional background, having worked for financial, political, and non-governmental organizations.

 

 

 

William J. Perry Conference Room

Encina Hall, 2nd floor

616 Serra Street

Stanford, CA 94305

Cybersecurity Fellow CISAC
Seminars
-

Michael McFaul, Director of the Freeman Spogli Institute for International Studies, Professor Political Science

and FSI Senior Fellow, Peter and Helen Bing Senior Fellow at the Hoover Institution

Francis Fukuyama, Mosbacher Director, Center for Democracy, Development, and the Rule of Law,

Larry Diamond, Senior Fellow at FSI and the Hoover Insitution

Eileen Donahoe, Executive Director, Global Digital Policy Incubator

 

Cordially Invite you to a conference conmemorating the launch of the 

Global Digital Policy Incubator

Friday, October 6, 2017

Bechtel Conference Center, Encina Hall

Registration / Coffee / Meet the Speakers

9:30-10:00am

Welcome to the Global Digital Policy Incubator

10:00-10:015am

When Freedom of Expression Conflicts with Democracy

Enhancing the Quality of Discourse Necessary to Sustain Democracy                  10:15-11:45am

Moderator: Larry Diamond, Senior Fellow at the Hoover Institution and FSI

Timothy Garton Ash, Hoover Institution, Stanford, Oxford University & Free Speech Debate

Francis Fukuyama, Director, Center for Democracy, Development, and the Rule of Law, Stanford

Brittan Heller, Director of Technology & Society, Anti-Defamation League

Ieva Kupce Ilves, Cybersecurity expert, former head of Cybersecurity Policy, MoD Latvia

Justine Isola, Product Policy Manager at Facebook

When Information Becomes the Weapon

Expanding notions of National Security in the Digital Context                                 12:00-1:45pm

Moderator: Michael Mcfaul, Director of FSI, former U.S. Ambassador to Russia

Toomas Ilves, Former President of Estonia

Mike Brown, Presidential Innovation Fellow, DIUX, Fformer CEO Symantec

Denis McDonough, White House Chief of Staff to former President Obama, Senior Principle, Markle Foundation

Nicole Wong, former U.S. Deputy CTO, former Google Vice President & Deputy General Counsel,

former Legal Director of Product, Twitter

Digital Platforms and Democratic Responsibility

Emerging Private Sector Roles in Protecting Freedom and Security                       2:00-3:30pm

Moderator: Larry Kramer, President of the Hewlett Foundation 

Juniper Downs, Global Head of Public Policy and Government Relations, Youtube

Daphne Keller, Director of Intermediary Liability, Center for Internet & Society, Stanford Law School

Andrew McLaughlin, Co-Founder, Higher Ground Labs, Venter Partner, Betaworks, former U.S. Dep. CTO

Nick Pickles, Senior Public Policy Manager, Twitter

Mike Posner, Director, NYU Stern Center for Business & Human Rights, former U.S. Assistant Secretary of State, Democracy, Human Rights, and Labor

Keynote Conversation 

Digital Technology, Diplomacy, and Democratic Values                                                     

Former Secretary of State Hilary Clinton

In conversation with Eileen Donahoe, Executive Director of the Global Digital Policy Incubator,

former U.S. Ambassador to the United Nations Human Rights Council

4:30 - 5:30pm

Cemex Auditorium, Knight Management Center

*event by invitation only, doors open at 3:30pm, guests must be in their seats 4:15pm*

Ticket Lottery for (Stanford students only) will open Wednesday, September 27 through the

Stanford Ticket Office 

Conferences
Subscribe to Cybersecurity